What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Rui Xue
Google Scholar
23
publications in security and cryptology related venues
Year
Venue
Title
2024
conf/ccs
Demo: Enhancing Smart Contract Security Comprehensively through Dynamic Symbolic Execution.
Zhaoxuan Li
Ziming Zhao
Wenhao Li
Rui Zhang
Rui Xue
Siqi Lu
Fan Zhang
2024
conf/asiacrypt
Measure-Rewind-Extract: Tighter Proofs of One-Way to Hiding and CCA Security in the Quantum Random Oracle Model.
Jiangxia Ge
Heming Liao
Rui Xue
2023
conf/crypto
Tighter QCCA-Secure Key Encapsulation Mechanism with Explicit Rejection in the Quantum Random Oracle Model.
Jiangxia Ge
Tianshu Shan
Rui Xue
2023
conf/pkc
QCCA-Secure Generic Transformations in the Quantum Random Oracle Model.
Tianshu Shan
Jiangxia Ge
Rui Xue
2022
conf/crypto
The Gap Is Sensitive to Size of Preimages: Collapsing Property Doesn't Go Beyond Quantum Collision-Resistance for Preimages Bounded Hash Functions.
Shujiao Cao
Rui Xue
2021
journals/compsec
Differentially private GANs by adding noise to Discriminator's loss.
Chunling Han
Rui Xue
2021
conf/provsec
Linearly Homomorphic Signatures with Designated Combiner.
Cheng-Jun Lin
Rui Xue
Xinyi Huang
2019
conf/icics
Adaptively Secure Puncturable Pseudorandom Functions via Puncturable Identity-Based KEMs.
Xin Wang
Shimin Li
Rui Xue
2019
conf/iwsec
Cocks' Identity-Based Encryption in the Standard Model, via Obfuscation Techniques (Short Paper).
Xin Wang
Shimin Li
Rui Xue
2018
conf/acisp
Private Functional Signatures: Definition and Construction.
Shimin Li
Bei Liang
Rui Xue
2018
conf/icics
Identity-Based Functional Encryption for Quadratic Functions from Lattices.
Kelly Yun
Xin Wang
Rui Xue
2017
conf/icics
Two Efficient Tag-Based Encryption Schemes on Lattices.
Xueqing Wang
Biao Wang
Rui Xue
2016
conf/icisc
Network Coding Signature Schemes Against Related-Key Attacks in the Random Oracle Model.
Jinyong Chang
Honglong Dai
Maozhi Xu
Rui Xue
2015
conf/icics
Verifiable Proxy Re-encryption from Indistinguishability Obfuscation.
Muhua Liu
Ying Wu
Jinyong Chang
Rui Xue
Wei Guo
2013
conf/cans
Zero Knowledge Proofs from Ring-LWE.
Xiang Xie
Rui Xue
Minqian Wang
2012
conf/acns
Inner-Product Lossy Trapdoor Functions and Applications.
Xiang Xie
Rui Xue
Rui Zhang
2011
conf/ccs
On the invisibility of designated confirmer signatures.
Fubiao Xia
Guilin Wang
Rui Xue
2011
conf/fc
Toward Real-Life Implementation of Signature Schemes from the Strong RSA Assumption.
Ping Yu
Rui Xue
2011
conf/icics
Computational Soundness about Formal Encryption in the Presence of Secret Shares and Key Cycles.
Xinfeng Lei
Rui Xue
Ting Yu
2009
conf/ctrsa
Statistically Hiding Sets.
Manoj Prabhakaran
Rui Xue
2007
conf/acns
Universal Accumulators with Efficient Nonmembership Proofs.
Jiangtao Li
Ninghui Li
Rui Xue
2007
conf/icics
Toward Practical Anonymous Rerandomizable RCCA Secure Encryptions.
Rui Xue
Dengguo Feng
2005
journals/compsec
A randomized RSA-based partially blind signature scheme for electronic cash.
Tianjie Cao
Dongdai Lin
Rui Xue
Coauthors
Bei Liang
(1)
Biao Wang
(1)
Cheng-Jun Lin
(1)
Chunling Han
(1)
Dengguo Feng
(1)
Dongdai Lin
(1)
Fan Zhang
(1)
Fubiao Xia
(1)
Guilin Wang
(1)
Heming Liao
(1)
Honglong Dai
(1)
Jiangtao Li
(1)
Jiangxia Ge
(3)
Jinyong Chang
(2)
Kelly Yun
(1)
Manoj Prabhakaran
(1)
Maozhi Xu
(1)
Minqian Wang
(1)
Muhua Liu
(1)
Ninghui Li
(1)
Ping Yu
(1)
Rui Xue
(23)
Rui Zhang
(1)
Rui Zhang
(1)
Shimin Li
(3)
Shujiao Cao
(1)
Siqi Lu
(1)
Tianjie Cao
(1)
Tianshu Shan
(2)
Ting Yu
(1)
Wei Guo
(1)
Wenhao Li
(1)
Xiang Xie
(2)
Xin Wang
(3)
Xinfeng Lei
(1)
Xinyi Huang
(1)
Xueqing Wang
(1)
Ying Wu
(1)
Zhaoxuan Li
(1)
Ziming Zhao
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to